Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Recognition of repetition and prolongation in stuttered speech using ANN
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2016) Savin, P.S.; Ramteke, P.B.; Koolagudi, S.G.
    This paper mainly focuses on repetition and prolongation detection in stuttered speech signal. The acoustic and pitch related features like Mel-frequency cepstral coefficients (MFCCs), formants, pitch, zero crossing rate (ZCR) and Energy are used to test the effectiveness in recognizing repetitions and prolongations in stammered speech. Artificial Neural Networks (ANN) are used as classifier. The results are evaluated using combination of different features. The results show that the ANN classifier trained using MFCC features achieves an average accuracy of 87.39% for repetition and prolongation recognition. © Springer India 2016.
  • Item
    On-the-Fly Encryption Security in Remote Storage
    (Institute of Electrical and Electronics Engineers Inc., 2016) Prabhakar, A.; Savin, P.S.; Chandrasekaran, K.
    Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation. © 2015 IEEE.